993 lines
53 KiB
JSON
993 lines
53 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20161277",
|
|
"Version": "oval:org.altlinux.errata:def:20161277",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2016-1277: package `firefox` update to version 45.0.1-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p11"
|
|
],
|
|
"Products": [
|
|
"ALT Container"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2016-1277",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1277",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00718",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00718",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00719",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00719",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00720",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00720",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00721",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00721",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00722",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00722",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00723",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00723",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00724",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00724",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00725",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00725",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00726",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00726",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00727",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00727",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00728",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00728",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00729",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00729",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00730",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00730",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00741",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00741",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00743",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00743",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00744",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00744",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00745",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00745",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00749",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00749",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00750",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00750",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00751",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00751",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00752",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00752",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00753",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00753",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00754",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00754",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00755",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00755",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00756",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00756",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00757",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00757",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00758",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00758",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00759",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00759",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00760",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00760",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00761",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00761",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00763",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00763",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00764",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00764",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00765",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00765",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00766",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00766",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1952",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1952",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1953",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1953",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1954",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1954",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1955",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1955",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1957",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1957",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1958",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1958",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1959",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1959",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1960",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1960",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1961",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1961",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1962",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1962",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1963",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1963",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1964",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1964",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1965",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1965",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1966",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1966",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1967",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1967",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1968",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1968",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1969",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1969",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1973",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1973",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1974",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1974",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1975",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1975",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1977",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1977",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2790",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2790",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2791",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2791",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2792",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2792",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2793",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2793",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2794",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2794",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2795",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2795",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2796",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2796",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2797",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2797",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2798",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2798",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2799",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2799",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2800",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2800",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2801",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2801",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2802",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2802",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades firefox to version 45.0.1-alt1. \nSecurity Fix(es):\n\n * BDU:2016-00718: Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00719: Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00720: Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00721: Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00722: Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00723: Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00724: Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00725: Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00726: Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00727: Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00728: Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00729: Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00730: Уязвимость программного средства рендеринга Graphite 2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00741: Уязвимость программного средства рендеринга Graphite 2, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00743: Уязвимости браузера Firefox, позволяющие нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00744: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00745: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00749: Уязвимость программного средства рендеринга Graphite 2, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00750: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00751: Уязвимость браузера Firefox, позволяющая нарушителю получить конфиденциальную информацию или обойти существующую политику ограничения доступа\n\n * BDU:2016-00752: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00753: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю подделать адресную строку\n\n * BDU:2016-00754: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00755: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2016-00756: Уязвимость браузеров Firefox ESR и Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-00757: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-00758: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00759: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00760: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю подделать адресную строку\n\n * BDU:2016-00761: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00763: Уязвимость браузера Firefox, позволяющая нарушителю получить конфиденциальную информацию или обойти существующую политику ограничения доступа\n\n * BDU:2016-00764: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2016-00765: Уязвимости почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00766: Уязвимости почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * CVE-2016-1952: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2016-1953: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to js/src/jit/arm/Assembler-arm.cpp, and unknown other vectors.\n\n * CVE-2016-1954: The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.\n\n * CVE-2016-1955: Mozilla Firefox before 45.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information by reading a Content Security Policy (CSP) violation report that contains path information associated with an IFRAME element.\n\n * CVE-2016-1957: Memory leak in libstagefright in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to cause a denial of service (memory consumption) via an MPEG-4 file that triggers a delete operation on an array.\n\n * CVE-2016-1958: browser/base/content/browser.js in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to spoof the address bar via a javascript: URL.\n\n * CVE-2016-1959: The ServiceWorkerManager class in Mozilla Firefox before 45.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via unspecified use of the Clients API.\n\n * CVE-2016-1960: Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.\n\n * CVE-2016-1961: Use-after-free vulnerability in the nsHTMLDocument::SetBody function in dom/html/nsHTMLDocument.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of a root element, aka ZDI-CAN-3574.\n\n * CVE-2016-1962: Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.\n\n * CVE-2016-1963: The FileReader class in Mozilla Firefox before 45.0 allows local users to gain privileges or cause a denial of service (memory corruption) by changing a file during a FileReader API read operation.\n\n * CVE-2016-1964: Use-after-free vulnerability in the AtomicBaseIncDec function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging mishandling of XML transformations.\n\n * CVE-2016-1965: Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 mishandle a navigation sequence that returns to the original page, which allows remote attackers to spoof the address bar via vectors involving the history.back method and the location.protocol property.\n\n * CVE-2016-1966: The nsNPObjWrapper::GetNewOrUsed function in dom/plugins/base/nsJSNPRuntime.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference and memory corruption) via a crafted NPAPI plugin.\n\n * CVE-2016-1967: Mozilla Firefox before 45.0 does not properly restrict the availability of IFRAME Resource Timing API times, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that leverages history.back and performance.getEntries calls after restoring a browser session. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-7207.\n\n * CVE-2016-1968: Integer underflow in Brotli, as used in Mozilla Firefox before 45.0, allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted data with brotli compression.\n\n * CVE-2016-1969: The setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.6.1, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted Graphite smart font.\n\n * CVE-2016-1973: Race condition in the GetStaticInstance function in the WebRTC implementation in Mozilla Firefox before 45.0 might allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via unspecified vectors.\n\n * CVE-2016-1974: The nsScannerString::AppendUnicodeTo function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not verify that memory allocation succeeds, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via crafted Unicode data in an HTML, XML, or SVG document.\n\n * CVE-2016-1975: Multiple race conditions in dom/media/systemservices/CamerasChild.cpp in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2016-1977: The Machine::Code::decoder::analysis::set_ref function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted Graphite smart font.\n\n * CVE-2016-2790: The graphite2::TtfUtil::GetTableInfo function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.\n\n * CVE-2016-2791: The graphite2::GlyphCache::glyph function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.\n\n * CVE-2016-2792: The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2800.\n\n * CVE-2016-2793: CachedCmap.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.\n\n * CVE-2016-2794: The graphite2::TtfUtil::CmapSubtable12NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.\n\n * CVE-2016-2795: The graphite2::FileFace::get_table_fn function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.\n\n * CVE-2016-2796: Heap-based buffer overflow in the graphite2::vm::Machine::Code::Code function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.\n\n * CVE-2016-2797: The graphite2::TtfUtil::CmapSubtable12Lookup function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2801.\n\n * CVE-2016-2798: The graphite2::GlyphCache::Loader::Loader function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.\n\n * CVE-2016-2799: Heap-based buffer overflow in the graphite2::Slot::setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.\n\n * CVE-2016-2800: The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2792.\n\n * CVE-2016-2801: The graphite2::TtfUtil::CmapSubtable12Lookup function in TtfUtil.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2797.\n\n * CVE-2016-2802: The graphite2::TtfUtil::CmapSubtable4NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2016-03-22"
|
|
},
|
|
"Updated": {
|
|
"Date": "2016-03-22"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2016-00718",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00718",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00719",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00719",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00720",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00720",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00721",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00721",
|
|
"Impact": "Critical",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00722",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00722",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00723",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00723",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00724",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00724",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00725",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-19",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00725",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00726",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00726",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00727",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00727",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00728",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00728",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00729",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00729",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00730",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-19",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00730",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00741",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00741",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00743",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00743",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00744",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00744",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00745",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00745",
|
|
"Impact": "Critical",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00749",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00749",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00750",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00750",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00751",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00751",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00752",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00752",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00753",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00753",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00754",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00754",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00755",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00755",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00756",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00756",
|
|
"Impact": "Critical",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00757",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00757",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00758",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00758",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00759",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00759",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00760",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00760",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00761",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00761",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00763",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00763",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00764",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00764",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00765",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00765",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00766",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00766",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2016-1952",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1952",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1953",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1953",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1954",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1954",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1955",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1955",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1957",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1957",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1958",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1958",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1959",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1959",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1960",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1960",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1961",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1961",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1962",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1962",
|
|
"Impact": "Critical",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1963",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1963",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1964",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1964",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1965",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1965",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1966",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1966",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1967",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1967",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1968",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1968",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1969",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1969",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1973",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1973",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1974",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1974",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1975",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1975",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1977",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1977",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2790",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-19",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2790",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2791",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2791",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2792",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2792",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2793",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2793",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2794",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2794",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2795",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-19",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2795",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2796",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2796",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2797",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2797",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2798",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2798",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2799",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2799",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2800",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2800",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2801",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2801",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2802",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2802",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:container:11"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161277001",
|
|
"Comment": "firefox is earlier than 0:45.0.1-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161277002",
|
|
"Comment": "rpm-build-firefox is earlier than 0:45.0.1-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |